Robert Millan, le Thu 24 Nov 2011 19:38:44 +0100, a écrit :
> 2011/11/23 Samuel Thibault :
> >> (it remains to be found whether it's true on Hurd pfinet, anyone can
> >> find out by running "ping 127.0.1.1"?)
> >
> > Hurd pfinet uses Linux' stack and indeed uses 255.0.0.0.
>
> Unless I missed some
2011/11/23 Samuel Thibault :
>> (it remains to be found whether it's true on Hurd pfinet, anyone can
>> find out by running "ping 127.0.1.1"?)
>
> Hurd pfinet uses Linux' stack and indeed uses 255.0.0.0.
Unless I missed something, using a 255.0.0.0 netmask only implies that
packets sent to 127.0.0
Robert Millan, le Wed 23 Nov 2011 19:17:16 +0100, a écrit :
> 127.0.1.1 hack introduced in commit 6762701e15829b1857fe252c1de642f8ec00f8a8
> is based on the assumption that when loopback interface is set with
> a 255.0.0.0 netmask, it will identify itself by any address belonging to
> this subnet.
2011/11/23 Axel Beckert :
> Seems as if it works:
Thanks for testing. Patch updated.
--
Robert Millan
diff --git a/netcfg-common.c b/netcfg-common.c
index 4b2a8a0..6053a48 100644
--- a/netcfg-common.c
+++ b/netcfg-common.c
@@ -1042,19 +1042,23 @@ void netcfg_write_common(struct in_addr ipaddres
Hi Robert,
Robert Millan wrote:
> (it remains to be found whether it's true on Hurd pfinet, anyone can
> find out by running "ping 127.0.1.1"?)
Seems as if it works:
strauss:~# ping 127.0.1.1
PING 127.0.1.1 (127.0.1.1): 56 data bytes
64 bytes from 127.0.1.1: icmp_seq=0 ttl=255 time=10.053 ms
64
Package: netcfg
Version: 1.70
Severity: normal
Tags: patch
127.0.1.1 hack introduced in commit 6762701e15829b1857fe252c1de642f8ec00f8a8
is based on the assumption that when loopback interface is set with
a 255.0.0.0 netmask, it will identify itself by any address belonging to
this subnet. This is
6 matches
Mail list logo